Rooted
Overall fun box which teached me a lot. Pay attention to details, write things down while enumerating and keep things simple
PM for nudges
Rooted
Overall fun box which teached me a lot. Pay attention to details, write things down while enumerating and keep things simple
PM for nudges
who the f keep turning off the p***** ***e
Rooted. Fun box.
Type your comment> @vicio said:
Type your comment> @fr0ster said:
I’ve done it
id
uid=0(root) gid=0(root) groups=0(root)
Thanks @ASHacker for this Box and my team-mates for tips and helps
Doesn’t count if you don’t show the hostname of the machine :lol:
Ok
# cat <hide>/hostname && id
cache
uid=0(root) gid=0(root) groups=0(root)
Looks like there is another login page for H**, but I can’t find it anywhere! Any hints?
Rooted! Very nice box!
finally!!! got root good machine , with quite good challanges like sq** and dock** ,
Foothold: enumeration is key ,look closer and find exploit be more specific in chossing exploit
user: Take notes to keep track what have u found ,may be it can be used later;
root: Take advantage of services hosted locally that will lead u to root , again enumeration is key,Keep digging u should know your powers;
if u need help Discord: itachi982#0535
if that helped u give me respect at : #itachi982 #ID:182298
Thanks @hg8 , @cerebro11 , @71xn
Happy hacking,Try harder.
itachi982
Type your comment> @StormCr0 said:
Looks like there is another login page for H**, but I can’t find it anywhere! Any hints?
fuzz that virtual host network
Rooted. Cool box, i learned a few things. Overall, I think Admirer was a bit harder than this one, but both were good experiences.
Thanks to @Dark0 for the nudge on the foothold.
@sparkla said:
Do I need the second user for root? Please P.M. if it’s a spoiler
This depends on what your current user is. I got the “second” user before gaining access to the first one
Would love a pm hint on enumeration. I found the n**.h*** but assuming that is rabbit hole.
Is P****** P***** supposed to be off by default or is someone messing with those who haven’t made it in yet? I’m finding enumeration on the H** side to be very difficult because it seems like the service is constantly being altered, and finding any way of authenticating to do one of the exploits I’ve found looks like an exercise in futility.
@ph03nix0x90 said:
Is P****** P***** supposed to be off by default or is someone messing with those who haven’t made it in yet? I’m finding enumeration on the H** side to be very difficult because it seems like the service is constantly being altered, and finding any way of authenticating to do one of the exploits I’ve found looks like an exercise in futility.
It is supposed to be available. But yes, people tend to constantly break the machine by using ready-made scripts, instead of using a way easier (and more stable) option for gaining RCE on the server.
Spoiler Removed
Google is your best friend when it comes to find a flaw on your victims.
User: Go back to your notes
I am going to chalk this up to working from home and not giving this 100% attention. But I spent over an hour looking for the lateral move before I figured out it was literally the very first thing I found
It’s interesting to see people talk about user and lateral movement. Depending on how you did the box, you could do either user first after you get a foothold. You don’t have to go in a specific order. However one holds the flag and the other is on the path to bigger things. You can definitely get root first and then back track.
Hi,
I suddenly found the /por**l directory is enabled, it was disabled yesterday… which is the original state?
Rooted, need help, let me know.
Rooted.
Very fun box, I learnt a couple new things and have some new tricks up my sleeve now.
I’m interested to hear how others got root first. I think I took intended paths.